<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Zone Based Firewall and SSL VPN in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/zone-based-firewall-and-ssl-vpn/m-p/1650077#M594736</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ACL "tunnel-traffic" is configured in the wrong direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently it's as follows:&lt;/P&gt;&lt;P&gt;ip access-list extended tunnel-traffic&lt;BR /&gt; permit ip any 192.168.12.0 0.0.0.7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It should be as follows:&lt;/P&gt;&lt;P&gt;ip access-list extended tunnel-traffic&lt;BR /&gt; permit ip 192.168.12.0 0.0.0.7 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OR/ if you would like to be more restrictive, it should be as follows:&lt;/P&gt;&lt;P&gt;ip access-list extended tunnel-traffic&lt;BR /&gt; permit ip 192.168.12.0 0.0.0.7 192.168.13.0 0.0.0.15&lt;/P&gt;&lt;P&gt; permit ip 192.168.12.0 0.0.0.7 192.168.14.0 0.0.0.63&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because it is in the direction of VPN pool towards both the DMZ (policy: vpn-to-dmz-policy) and inside (policy: vpn-to-in-policy) subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 10 Jan 2011 08:38:34 GMT</pubDate>
    <dc:creator>Jennifer Halim</dc:creator>
    <dc:date>2011-01-10T08:38:34Z</dc:date>
    <item>
      <title>Zone Based Firewall and SSL VPN</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-and-ssl-vpn/m-p/1650076#M594735</link>
      <description>&lt;P&gt;Hello. I have a cisco 1841 router and i am trying to make it work as a zone based firewall with anyconnect ssl vpn connections. I have created 4 zones (Inside, Outside, DMZ and VPN) and i managed to have the router working with internet traffic and vpn connectivity. However i cannot access any of the hosts on DMZ and Inside zones, After the VPN gets established i can ping the router interface IP's&amp;nbsp; (Inside, DMZ) but from there and on "silence". I am trying to take remote desktop of a pc in the DMZ zone but i cannot. Try to use an sql server on the inside with the same results.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So my question is obvious. How can i make it to pass my traffic to the hosts i intend to??&lt;/P&gt;&lt;P&gt;What is wrong with my (attached with changed ip's and domains and etc.) config?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would be grateful for any help. Thans very much in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 19:32:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-and-ssl-vpn/m-p/1650076#M594735</guid>
      <dc:creator>tkatsiaounis</dc:creator>
      <dc:date>2019-03-11T19:32:44Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall and SSL VPN</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-and-ssl-vpn/m-p/1650077#M594736</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;ACL "tunnel-traffic" is configured in the wrong direction.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Currently it's as follows:&lt;/P&gt;&lt;P&gt;ip access-list extended tunnel-traffic&lt;BR /&gt; permit ip any 192.168.12.0 0.0.0.7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It should be as follows:&lt;/P&gt;&lt;P&gt;ip access-list extended tunnel-traffic&lt;BR /&gt; permit ip 192.168.12.0 0.0.0.7 any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OR/ if you would like to be more restrictive, it should be as follows:&lt;/P&gt;&lt;P&gt;ip access-list extended tunnel-traffic&lt;BR /&gt; permit ip 192.168.12.0 0.0.0.7 192.168.13.0 0.0.0.15&lt;/P&gt;&lt;P&gt; permit ip 192.168.12.0 0.0.0.7 192.168.14.0 0.0.0.63&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Because it is in the direction of VPN pool towards both the DMZ (policy: vpn-to-dmz-policy) and inside (policy: vpn-to-in-policy) subnet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope that helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Jan 2011 08:38:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-and-ssl-vpn/m-p/1650077#M594736</guid>
      <dc:creator>Jennifer Halim</dc:creator>
      <dc:date>2011-01-10T08:38:34Z</dc:date>
    </item>
    <item>
      <title>Re: Zone Based Firewall and SSL VPN</title>
      <link>https://community.cisco.com/t5/network-security/zone-based-firewall-and-ssl-vpn/m-p/1650078#M594737</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;THANKS a lot. Really couldn't see that. Saved me from a headache.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 10 Jan 2011 08:44:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/zone-based-firewall-and-ssl-vpn/m-p/1650078#M594737</guid>
      <dc:creator>tkatsiaounis</dc:creator>
      <dc:date>2011-01-10T08:44:47Z</dc:date>
    </item>
  </channel>
</rss>

